194b0ad8eSDeclan Doherty /*- 294b0ad8eSDeclan Doherty * BSD LICENSE 394b0ad8eSDeclan Doherty * 494b0ad8eSDeclan Doherty * Copyright(c) 2016 Intel Corporation. All rights reserved. 594b0ad8eSDeclan Doherty * 694b0ad8eSDeclan Doherty * Redistribution and use in source and binary forms, with or without 794b0ad8eSDeclan Doherty * modification, are permitted provided that the following conditions 894b0ad8eSDeclan Doherty * are met: 994b0ad8eSDeclan Doherty * 1094b0ad8eSDeclan Doherty * * Redistributions of source code must retain the above copyright 1194b0ad8eSDeclan Doherty * notice, this list of conditions and the following disclaimer. 1294b0ad8eSDeclan Doherty * * Redistributions in binary form must reproduce the above copyright 1394b0ad8eSDeclan Doherty * notice, this list of conditions and the following disclaimer in 1494b0ad8eSDeclan Doherty * the documentation and/or other materials provided with the 1594b0ad8eSDeclan Doherty * distribution. 1694b0ad8eSDeclan Doherty * * Neither the name of Intel Corporation nor the names of its 1794b0ad8eSDeclan Doherty * contributors may be used to endorse or promote products derived 1894b0ad8eSDeclan Doherty * from this software without specific prior written permission. 1994b0ad8eSDeclan Doherty * 2094b0ad8eSDeclan Doherty * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 2194b0ad8eSDeclan Doherty * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 2294b0ad8eSDeclan Doherty * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 2394b0ad8eSDeclan Doherty * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 2494b0ad8eSDeclan Doherty * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 2594b0ad8eSDeclan Doherty * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT 2694b0ad8eSDeclan Doherty * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 2794b0ad8eSDeclan Doherty * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 2894b0ad8eSDeclan Doherty * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 2994b0ad8eSDeclan Doherty * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 3094b0ad8eSDeclan Doherty * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 3194b0ad8eSDeclan Doherty */ 3294b0ad8eSDeclan Doherty 3394b0ad8eSDeclan Doherty #include <rte_common.h> 3494b0ad8eSDeclan Doherty #include <rte_config.h> 3594b0ad8eSDeclan Doherty #include <rte_cryptodev_pmd.h> 36fe363dd4SJan Viktorin #include <rte_vdev.h> 3794b0ad8eSDeclan Doherty #include <rte_malloc.h> 3894b0ad8eSDeclan Doherty 3994b0ad8eSDeclan Doherty #include "null_crypto_pmd_private.h" 4094b0ad8eSDeclan Doherty 4194b0ad8eSDeclan Doherty /** verify and set session parameters */ 4294b0ad8eSDeclan Doherty int 4394b0ad8eSDeclan Doherty null_crypto_set_session_parameters( 4494b0ad8eSDeclan Doherty struct null_crypto_session *sess __rte_unused, 4594b0ad8eSDeclan Doherty const struct rte_crypto_sym_xform *xform) 4694b0ad8eSDeclan Doherty { 4794b0ad8eSDeclan Doherty if (xform == NULL) { 4894b0ad8eSDeclan Doherty return -1; 4994b0ad8eSDeclan Doherty } else if (xform->type == RTE_CRYPTO_SYM_XFORM_AUTH && 5094b0ad8eSDeclan Doherty xform->next == NULL) { 5194b0ad8eSDeclan Doherty /* Authentication Only */ 5294b0ad8eSDeclan Doherty if (xform->auth.algo == RTE_CRYPTO_AUTH_NULL) 5394b0ad8eSDeclan Doherty return 0; 5494b0ad8eSDeclan Doherty } else if (xform->type == RTE_CRYPTO_SYM_XFORM_AUTH && 5594b0ad8eSDeclan Doherty xform->next->type == RTE_CRYPTO_SYM_XFORM_CIPHER) { 5694b0ad8eSDeclan Doherty /* Authentication then Cipher */ 5794b0ad8eSDeclan Doherty if (xform->auth.algo == RTE_CRYPTO_AUTH_NULL && 5894b0ad8eSDeclan Doherty xform->next->cipher.algo == RTE_CRYPTO_CIPHER_NULL) 5994b0ad8eSDeclan Doherty return 0; 6094b0ad8eSDeclan Doherty } else if (xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER && 6194b0ad8eSDeclan Doherty xform->next == NULL) { 6294b0ad8eSDeclan Doherty /* Cipher Only */ 6394b0ad8eSDeclan Doherty if (xform->cipher.algo == RTE_CRYPTO_CIPHER_NULL) 6494b0ad8eSDeclan Doherty return 0; 6594b0ad8eSDeclan Doherty } else if (xform->type == RTE_CRYPTO_SYM_XFORM_CIPHER && 6694b0ad8eSDeclan Doherty xform->next->type == RTE_CRYPTO_SYM_XFORM_AUTH) { 6794b0ad8eSDeclan Doherty /* Cipher then Authentication */ 6894b0ad8eSDeclan Doherty if (xform->cipher.algo == RTE_CRYPTO_CIPHER_NULL && 6994b0ad8eSDeclan Doherty xform->next->auth.algo == RTE_CRYPTO_AUTH_NULL) 7094b0ad8eSDeclan Doherty return 0; 7194b0ad8eSDeclan Doherty } 7294b0ad8eSDeclan Doherty 7394b0ad8eSDeclan Doherty return -1; 7494b0ad8eSDeclan Doherty } 7594b0ad8eSDeclan Doherty 7694b0ad8eSDeclan Doherty /** Process crypto operation for mbuf */ 7794b0ad8eSDeclan Doherty static int 7894b0ad8eSDeclan Doherty process_op(const struct null_crypto_qp *qp, struct rte_crypto_op *op, 7994b0ad8eSDeclan Doherty struct null_crypto_session *sess __rte_unused) 8094b0ad8eSDeclan Doherty { 8194b0ad8eSDeclan Doherty /* set status as successful by default */ 8294b0ad8eSDeclan Doherty op->status = RTE_CRYPTO_OP_STATUS_SUCCESS; 8394b0ad8eSDeclan Doherty 8494b0ad8eSDeclan Doherty /* 8594b0ad8eSDeclan Doherty * if crypto session and operation are valid just enqueue the packet 8694b0ad8eSDeclan Doherty * in the processed ring 8794b0ad8eSDeclan Doherty */ 8894b0ad8eSDeclan Doherty return rte_ring_enqueue(qp->processed_pkts, (void *)op); 8994b0ad8eSDeclan Doherty } 9094b0ad8eSDeclan Doherty 9194b0ad8eSDeclan Doherty static struct null_crypto_session * 9294b0ad8eSDeclan Doherty get_session(struct null_crypto_qp *qp, struct rte_crypto_sym_op *op) 9394b0ad8eSDeclan Doherty { 9494b0ad8eSDeclan Doherty struct null_crypto_session *sess; 9594b0ad8eSDeclan Doherty 96f0e7e253SFiona Trahe if (op->sess_type == RTE_CRYPTO_SYM_OP_WITH_SESSION) { 9794b0ad8eSDeclan Doherty if (unlikely(op->session == NULL || 98f0e7e253SFiona Trahe op->session->dev_type != RTE_CRYPTODEV_NULL_PMD)) 9994b0ad8eSDeclan Doherty return NULL; 10094b0ad8eSDeclan Doherty 10194b0ad8eSDeclan Doherty sess = (struct null_crypto_session *)op->session->_private; 10294b0ad8eSDeclan Doherty } else { 10394b0ad8eSDeclan Doherty struct rte_cryptodev_session *c_sess = NULL; 10494b0ad8eSDeclan Doherty 10594b0ad8eSDeclan Doherty if (rte_mempool_get(qp->sess_mp, (void **)&c_sess)) 10694b0ad8eSDeclan Doherty return NULL; 10794b0ad8eSDeclan Doherty 10894b0ad8eSDeclan Doherty sess = (struct null_crypto_session *)c_sess->_private; 10994b0ad8eSDeclan Doherty 11094b0ad8eSDeclan Doherty if (null_crypto_set_session_parameters(sess, op->xform) != 0) 11194b0ad8eSDeclan Doherty return NULL; 11294b0ad8eSDeclan Doherty } 11394b0ad8eSDeclan Doherty 11494b0ad8eSDeclan Doherty return sess; 11594b0ad8eSDeclan Doherty } 11694b0ad8eSDeclan Doherty 11794b0ad8eSDeclan Doherty /** Enqueue burst */ 11894b0ad8eSDeclan Doherty static uint16_t 11994b0ad8eSDeclan Doherty null_crypto_pmd_enqueue_burst(void *queue_pair, struct rte_crypto_op **ops, 12094b0ad8eSDeclan Doherty uint16_t nb_ops) 12194b0ad8eSDeclan Doherty { 12294b0ad8eSDeclan Doherty struct null_crypto_session *sess; 12394b0ad8eSDeclan Doherty struct null_crypto_qp *qp = queue_pair; 12494b0ad8eSDeclan Doherty 12594b0ad8eSDeclan Doherty int i, retval; 12694b0ad8eSDeclan Doherty 12794b0ad8eSDeclan Doherty for (i = 0; i < nb_ops; i++) { 12894b0ad8eSDeclan Doherty sess = get_session(qp, ops[i]->sym); 12994b0ad8eSDeclan Doherty if (unlikely(sess == NULL)) 13094b0ad8eSDeclan Doherty goto enqueue_err; 13194b0ad8eSDeclan Doherty 13294b0ad8eSDeclan Doherty retval = process_op(qp, ops[i], sess); 13394b0ad8eSDeclan Doherty if (unlikely(retval < 0)) 13494b0ad8eSDeclan Doherty goto enqueue_err; 13594b0ad8eSDeclan Doherty } 13694b0ad8eSDeclan Doherty 13794b0ad8eSDeclan Doherty qp->qp_stats.enqueued_count += i; 13894b0ad8eSDeclan Doherty return i; 13994b0ad8eSDeclan Doherty 14094b0ad8eSDeclan Doherty enqueue_err: 14194b0ad8eSDeclan Doherty if (ops[i]) 14294b0ad8eSDeclan Doherty ops[i]->status = RTE_CRYPTO_OP_STATUS_INVALID_ARGS; 14394b0ad8eSDeclan Doherty 14494b0ad8eSDeclan Doherty qp->qp_stats.enqueue_err_count++; 14594b0ad8eSDeclan Doherty return i; 14694b0ad8eSDeclan Doherty } 14794b0ad8eSDeclan Doherty 14894b0ad8eSDeclan Doherty /** Dequeue burst */ 14994b0ad8eSDeclan Doherty static uint16_t 15094b0ad8eSDeclan Doherty null_crypto_pmd_dequeue_burst(void *queue_pair, struct rte_crypto_op **ops, 15194b0ad8eSDeclan Doherty uint16_t nb_ops) 15294b0ad8eSDeclan Doherty { 15394b0ad8eSDeclan Doherty struct null_crypto_qp *qp = queue_pair; 15494b0ad8eSDeclan Doherty 15594b0ad8eSDeclan Doherty unsigned nb_dequeued; 15694b0ad8eSDeclan Doherty 15794b0ad8eSDeclan Doherty nb_dequeued = rte_ring_dequeue_burst(qp->processed_pkts, 158*ecaed092SBruce Richardson (void **)ops, nb_ops, NULL); 15994b0ad8eSDeclan Doherty qp->qp_stats.dequeued_count += nb_dequeued; 16094b0ad8eSDeclan Doherty 16194b0ad8eSDeclan Doherty return nb_dequeued; 16294b0ad8eSDeclan Doherty } 16394b0ad8eSDeclan Doherty 16450a3345fSShreyansh Jain static int cryptodev_null_remove(const char *name); 16594b0ad8eSDeclan Doherty 16694b0ad8eSDeclan Doherty /** Create crypto device */ 16794b0ad8eSDeclan Doherty static int 168d803b443SFan Zhang cryptodev_null_create(struct rte_crypto_vdev_init_params *init_params) 16994b0ad8eSDeclan Doherty { 17094b0ad8eSDeclan Doherty struct rte_cryptodev *dev; 17194b0ad8eSDeclan Doherty struct null_crypto_private *internals; 17294b0ad8eSDeclan Doherty 173d803b443SFan Zhang if (init_params->name[0] == '\0') { 174d803b443SFan Zhang int ret = rte_cryptodev_pmd_create_dev_name( 175d803b443SFan Zhang init_params->name, 176d803b443SFan Zhang RTE_STR(CRYPTODEV_NAME_NULL_PMD)); 177d803b443SFan Zhang 178d803b443SFan Zhang if (ret < 0) { 179d803b443SFan Zhang NULL_CRYPTO_LOG_ERR("failed to create unique " 180d803b443SFan Zhang "name"); 181d803b443SFan Zhang return ret; 182d803b443SFan Zhang } 18394b0ad8eSDeclan Doherty } 18494b0ad8eSDeclan Doherty 185d803b443SFan Zhang dev = rte_cryptodev_pmd_virtual_dev_init(init_params->name, 18694b0ad8eSDeclan Doherty sizeof(struct null_crypto_private), 18794b0ad8eSDeclan Doherty init_params->socket_id); 18894b0ad8eSDeclan Doherty if (dev == NULL) { 18994b0ad8eSDeclan Doherty NULL_CRYPTO_LOG_ERR("failed to create cryptodev vdev"); 19094b0ad8eSDeclan Doherty goto init_error; 19194b0ad8eSDeclan Doherty } 19294b0ad8eSDeclan Doherty 19394b0ad8eSDeclan Doherty dev->dev_type = RTE_CRYPTODEV_NULL_PMD; 19494b0ad8eSDeclan Doherty dev->dev_ops = null_crypto_pmd_ops; 19594b0ad8eSDeclan Doherty 19694b0ad8eSDeclan Doherty /* register rx/tx burst functions for data path */ 19794b0ad8eSDeclan Doherty dev->dequeue_burst = null_crypto_pmd_dequeue_burst; 19894b0ad8eSDeclan Doherty dev->enqueue_burst = null_crypto_pmd_enqueue_burst; 19994b0ad8eSDeclan Doherty 20026c2e4adSDeclan Doherty dev->feature_flags = RTE_CRYPTODEV_FF_SYMMETRIC_CRYPTO | 2012d03ec6aSTomasz Kulasek RTE_CRYPTODEV_FF_SYM_OPERATION_CHAINING | 2022d03ec6aSTomasz Kulasek RTE_CRYPTODEV_FF_MBUF_SCATTER_GATHER; 20326c2e4adSDeclan Doherty 20494b0ad8eSDeclan Doherty internals = dev->data->dev_private; 20594b0ad8eSDeclan Doherty 20694b0ad8eSDeclan Doherty internals->max_nb_qpairs = init_params->max_nb_queue_pairs; 20794b0ad8eSDeclan Doherty internals->max_nb_sessions = init_params->max_nb_sessions; 20894b0ad8eSDeclan Doherty 20994b0ad8eSDeclan Doherty return 0; 21094b0ad8eSDeclan Doherty 21194b0ad8eSDeclan Doherty init_error: 212d803b443SFan Zhang NULL_CRYPTO_LOG_ERR("driver %s: cryptodev_null_create failed", 213d803b443SFan Zhang init_params->name); 214d803b443SFan Zhang cryptodev_null_remove(init_params->name); 21594b0ad8eSDeclan Doherty 21694b0ad8eSDeclan Doherty return -EFAULT; 21794b0ad8eSDeclan Doherty } 21894b0ad8eSDeclan Doherty 21994b0ad8eSDeclan Doherty /** Initialise null crypto device */ 22094b0ad8eSDeclan Doherty static int 22150a3345fSShreyansh Jain cryptodev_null_probe(const char *name, 22294b0ad8eSDeclan Doherty const char *input_args) 22394b0ad8eSDeclan Doherty { 22494b0ad8eSDeclan Doherty struct rte_crypto_vdev_init_params init_params = { 22594b0ad8eSDeclan Doherty RTE_CRYPTODEV_VDEV_DEFAULT_MAX_NB_QUEUE_PAIRS, 22694b0ad8eSDeclan Doherty RTE_CRYPTODEV_VDEV_DEFAULT_MAX_NB_SESSIONS, 227d803b443SFan Zhang rte_socket_id(), 228d803b443SFan Zhang {0} 22994b0ad8eSDeclan Doherty }; 23094b0ad8eSDeclan Doherty 23194b0ad8eSDeclan Doherty rte_cryptodev_parse_vdev_init_params(&init_params, input_args); 23294b0ad8eSDeclan Doherty 23394b0ad8eSDeclan Doherty RTE_LOG(INFO, PMD, "Initialising %s on NUMA node %d\n", name, 23494b0ad8eSDeclan Doherty init_params.socket_id); 235d803b443SFan Zhang if (init_params.name[0] != '\0') 236d803b443SFan Zhang RTE_LOG(INFO, PMD, " User defined name = %s\n", 237d803b443SFan Zhang init_params.name); 23894b0ad8eSDeclan Doherty RTE_LOG(INFO, PMD, " Max number of queue pairs = %d\n", 23994b0ad8eSDeclan Doherty init_params.max_nb_queue_pairs); 24094b0ad8eSDeclan Doherty RTE_LOG(INFO, PMD, " Max number of sessions = %d\n", 24194b0ad8eSDeclan Doherty init_params.max_nb_sessions); 24294b0ad8eSDeclan Doherty 243d803b443SFan Zhang return cryptodev_null_create(&init_params); 24494b0ad8eSDeclan Doherty } 24594b0ad8eSDeclan Doherty 24694b0ad8eSDeclan Doherty /** Uninitialise null crypto device */ 24794b0ad8eSDeclan Doherty static int 24850a3345fSShreyansh Jain cryptodev_null_remove(const char *name) 24994b0ad8eSDeclan Doherty { 25094b0ad8eSDeclan Doherty if (name == NULL) 25194b0ad8eSDeclan Doherty return -EINVAL; 25294b0ad8eSDeclan Doherty 25394b0ad8eSDeclan Doherty RTE_LOG(INFO, PMD, "Closing null crypto device %s on numa socket %u\n", 25494b0ad8eSDeclan Doherty name, rte_socket_id()); 25594b0ad8eSDeclan Doherty 25694b0ad8eSDeclan Doherty return 0; 25794b0ad8eSDeclan Doherty } 25894b0ad8eSDeclan Doherty 259fe363dd4SJan Viktorin static struct rte_vdev_driver cryptodev_null_pmd_drv = { 26050a3345fSShreyansh Jain .probe = cryptodev_null_probe, 26150a3345fSShreyansh Jain .remove = cryptodev_null_remove 26294b0ad8eSDeclan Doherty }; 26394b0ad8eSDeclan Doherty 26401f19227SShreyansh Jain RTE_PMD_REGISTER_VDEV(CRYPTODEV_NAME_NULL_PMD, cryptodev_null_pmd_drv); 265479c4af3SJan Blunck RTE_PMD_REGISTER_ALIAS(CRYPTODEV_NAME_NULL_PMD, cryptodev_null_pmd); 26601f19227SShreyansh Jain RTE_PMD_REGISTER_PARAM_STRING(CRYPTODEV_NAME_NULL_PMD, 26765eca099SPablo de Lara "max_nb_queue_pairs=<int> " 26865eca099SPablo de Lara "max_nb_sessions=<int> " 26965eca099SPablo de Lara "socket_id=<int>"); 270